CRLJ
search
⌘Ctrlk
CRLJ
  • README
  • Blue Team & SOC Analyst
    • Cybersecurity Fundamentals
    • Advanced Persistent Threat
    • Frameworks
    • Network Security Monitoring & Continuous Security Monitoring
    • Security Information and Event Management
    • Cyber Threat Intelligence
    • Security Operations Center
    • 08 Threat Hunting
    • Digital Forensics and Incident Response
    • Advanced Techniques for Evasive Malware Detection and Prevention
    • Blue Team
    • Hardware Security
    • Kerberos TGT Tickets
    • Mastering SELinux
    • Passwordless Authentication
    • Secure Coding Practices
  • Cryptography
  • GRC
  • Miscellaneous
  • Mobile
  • Network
  • RE - MA - ED
  • Red Team & Penetration Testing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Blue Team & SOC Analyst

Advanced Techniques for Evasive Malware Detection and Prevention

Discover a comprehensive array of cybersecurity and threat intelligence resources, including MalAPI, LOLBAS, GTFOBins, Bootloaders, FileSec, File Signatures, and more.

  • MalAPIarrow-up-right

  • Unprotectarrow-up-right

  • ARTToolkitarrow-up-right

  • Exploit Notesarrow-up-right

  • LOLBAS (Living Off The Land Binaries, Scripts and Libraries)arrow-up-right

  • LOFLCAB (Living off the Foreign Land Cmdlets and Binaries)arrow-up-right

  • LOLDrivers (Living Off The Land Drivers)arrow-up-right

  • LOLESXiarrow-up-right

  • LOTS (Living Off Trusted Sites)arrow-up-right

  • LOObins (Living Off the Orchard)arrow-up-right

  • GTFOBinsarrow-up-right

  • Bootloadersarrow-up-right

  • WTFBinsarrow-up-right

  • FileSecarrow-up-right

  • HijackLibsarrow-up-right

  • File Signaturesarrow-up-right

PreviousDigital Forensics and Incident Responsechevron-leftNextBlue Teamchevron-right

Last updated 6 months ago